Sciweavers

530 search results - page 4 / 106
» Practical Threshold Signatures
Sort
View
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 6 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
CSREASAM
2009
13 years 8 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 7 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
ACNS
2003
Springer
80views Cryptology» more  ACNS 2003»
13 years 10 months ago
A Threshold GQ Signature Scheme
We proposed the first threshold GQ signature scheme. The scheme is unforgeable and robust against any adaptive adversary if the base GQ signature scheme is unforgeable under the c...
Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 6 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu